Mostrando 4 resultados de: 4
Filtros aplicados
Publisher
IEEE Transactions on Power Systems(2)
17th Power Systems Computation Conference, PSCC 2011(1)
Electric Power Components and Systems(1)
Área temáticas
Física aplicada(3)
Economía de la tierra y la energía(2)
Ciencias de la computación(1)
Métodos informáticos especiales(1)
Programación informática, programas, datos, seguridad(1)
Área de conocimiento
Ingeniería energética(2)
Política energética(2)
Energía(1)
Inteligencia artificial(1)
Potencia eléctrica(1)
Origen
scopus(4)
Neural-network security-boundary constrained optimal power flow
ArticleAbstract: This paper proposes a new approach to model stability and security constraints in optimal power flowPalabras claves:neural network, optimal power flow, Power system security, Power System StabilityAutores:Claudio A. Cañizares, Fuerte-Esquivel C.R., Gu X., Gutierrez-Martinez V., Pizano-Martínez A.Fuentes:scopusVoltage source converter based high-voltage DC system modeling for optimal power flow studies
ArticleAbstract: This article presents an enhanced model of a two-terminal voltage source converter based high-voltagPalabras claves:high-voltage DC systems, non-linear programming problem, optimal power flow, Voltage Source ConverterAutores:César Ángeles-Camacho, Fuerte-Esquivel C.R., Pizano-Martínez A.Fuentes:scopusPractical Security Boundary-Constrained DC Optimal Power Flow for Electricity Markets
ArticleAbstract: This paper provides a systematic approach to address the fundamental electricity auction issue regarPalabras claves:electricity markets, optimal power flow, power dispatch, Power system securityAutores:Chavez-Lugo M., Claudio A. Cañizares, Fuerte-Esquivel C.R., Gutierrez-Martinez V.Fuentes:scopusPractical security-boundary-constrained dispatch models for electricity markets
Conference ObjectAbstract: This paper concentrates on a robust characterization of system security, in terms of voltage collapsPalabras claves:electricity markets, Locational marginal pricing, Neural networks, optimal power flow, power dispatch, Security constraintsAutores:Battistelli C., Bozchalui M., Claudio A. Cañizares, Fuerte-Esquivel C.R., Gutierrez-Martinez V.Fuentes:scopus